Article title: DDNS dynamic update method in RHEL4 system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
System: Red Hat Enterprise Linux 4 AS 4.0 implementation: DHCP + DNS
1. Generate KEY
# Dnssec-keygen-a HMAC-MD5-B 128-n USER DHCP_UPDATER
Kdhcp_updater. + xxx + xxxxx. key and are generated in the current dire
.okbuy.com (123.103.16.132)
There is no access control definition ACL (Access Control List) to restrict cross-region transfer between domain name servers.
Edit/etc/named. conf
Set in zone configuration of okbuy.com
Allow-transfer {localhost; 123.103.16.133 ;};
Or
Allow-transfer {localhost; 123.103.16.132 ;};
Iv. Safe
4.1. Dns Security Policy,4.1.1 isolate the DNS server, and use the backup Domain Name Server 4.1.2 to hide the bind version 4.1.3.
4.1.4Chroot bind
4.1.5 prohibit regional transfer
The official version of Fedora15, codenamed Lovelock, is officially released today. For details, see the Chinese release announcement. Fedora15 is equipped with a brand new Gnome3 desktop environment and provides a large number of new features and new components. The main features of Fedora15 include: Gnome3 desktop environment: This is the main version of the Next Generation Gnome environment, providing a brand new desktop interface GnomeShell. Libreoffice office suite:
The official version of
inconsistent with the registration record above, and the MX record configured for its cname record value is the result of recursive query on the cname record.
However, if the ttl of the recursive server's cname record expires, the query will be performed again, but the query order will be reversed (that is, the MX record will be queried first and then the cname record will be queried) the expected results may be obtained.
To sum up, when the recursive DNS server queries a regular Domain Name Re
porting to the arm board, you can pack and copy the directory directly.Configre successful output of the information--------------------------------------------------------- Net-SNMP configuration summary:--------------------------------------------------------- SNMP Versions Supported: 1 2c 3 Building for: linux Net-SNMP Version: 5.7.3 Network transport support: Callback Unix Alias TCP UDP IPv4Base SocketBase TCPBase UDPIPv4Base UDPBase SNMPv3 Securi
it, more or less, but it's a recent development).
Verify This theintended server Nameis indeed written in the server ' s certificate. Because the client does not only want to use a validated public key, it also wants to use the public keyof a specifi C server. SEENBSP;RFC 2818for details on how the is do in a HTTPS context.
The certification model with certificates have often been criticized, not really on technical grounds, but rather for Politico-economic reasons. It concentrates
1. Experimental topological structureFig. 1 Experimental topological diagram2. Project RequirementsThe system is built to dynamically update DNS information for the Web server.3, Project development ideas (mind map)Figure 2 DDNS Experimental Mind Mapping4. Experimental steps (1) Basic network constructionDHCP server can ping DNS serverFigure 3 Network Connectivity test(2) on the DNS server1) Installing the DNS service[[Email protected] Desktop]# yum install bind-y2) Generate key[[Email protected
using python for whois queries
installing whois with the PIP command
Pip Install Python-whois
Python 2.7.6 (default, OCT 2016, 20:30:19)
[GCC 4.8.4] on linux2
Type ' help ', ' copyright ', ' credits ' or ' Licens E "For more information.
" >>> import whois
>>>
How to use the installation successfully
[GCC 4.8.4] on linux2
Type ' help ', ' copyright ', ' credits ' or ' license ' for the more information.
>>> Import whois
Use
Whois.whois (URL)
To query the WHOIS information for the domain nam
Ietf:the Internet Engineering Task Force Internet Engineering Tasks GroupW3c:world Wide Web Consortium www Federation
Here is a more detailed description: The difference between IETF and the consortium
The IETF has a broader range of responsibilities than the Consortium, which is responsible for defining and managing all aspects of Internet technology. Includes IP protocols for data transfer, domain Name System (DNS) that matches domain names to IP addresses, Simple Mail Transfer Protocol (SMT
/M01/8A/EC/wKioL1g_qsTwXjy-AADIZz6XUto294.png "style=" float: none; "title=" 7.png "alt=" Wkiol1g_qstwxjy-aadizz6xuto294.png "/>4) Set the key to indicate that only the key user has the update permission. Encryption is HMAC-MD5 "similar/etc/rndc.key""Add encryption Key"Dnssec-keygen-a hmac-md5-b 128-n Host Hxl "-a hmac-md5 means that encryption is Hmac-md5;-b 128 means that the encryption length is 128;-n HOST means that the cryptographic service is H
machines (or even the entire LAN), and (2) to the end-to-end packet traffic security, which is done by the computer as the endpoint. Any of these patterns can be used to build a virtual private network (VPN), which is one of the most important uses of IPSec . It should be noted that the above two modes of operation are very different in the implementation of security. The development of Internet-wide end-to-end communication security is slower than expected, partly because it is not widespread
Dnsmasq Security Restriction Bypass Vulnerability (CVE-2017-15107)Dnsmasq Security Restriction Bypass Vulnerability (CVE-2017-15107)
Release date:Updated on:Affected Systems:
Dnsmasq
Description:
Bugtraq id: 102812CVE (CAN) ID: CVE-2017-15107Dnsmasq is a lightweight DNS forwarder and DHCP server.Dnsmasq 2.78 and earlier versions have security vulnerabilities in DNSSEC. After successful exploitation, attackers can bypass certain security restric
site you want to visit? (It's a little tongue twister)Some naïve reunion said: By looking at the domain name inside the URL to ensure. Why say such a classmate is "naïve"? Because the DNS system itself is unreliable (especially in the era of SSL design, even DNSSEC has not been invented). Due to the unreliable DNS (the existence of "domain spoofing" and "Domain Hijacking"), you see the URL inside the domain name "not necessarily" is the real drop!(Do
schedule, and a public release schedule will be provided. The Red Hat project team will continue to participate in the development of Fedora and will invite and encourage more external participants than ever before. By adopting such a more open process, we hope to provide an operating system that is more in line with the concept of free software and more attractive to the open source community.
New Features of Alpha ora 15 Alpha:
New desktop environments: GNOME 3, KDE 4.6, Xfce 4.8, and Sugar
update your keys. See https://www.isc.org/bind-keys
// ================================================ ========================================
DNSSEC-validation Auto;
Auth-nxdomain no; # conform to rfc1035
Listen-on-v6 {Any ;};
};
Configure the primary DNS Server
Create forward zone File
Sudo Vim/etc/bind/named. conf. Local
Add the following content
[Plain]View plaincopy
Zone "qyjob.net "{
Type master;
File "db.qyjob.net ";
};
Sudo C
"null "{NULL; // discard all messages sent to this channel};CATEGORY statementThe category statement specifies which type of information to use or which channel outputs have been defined.
Available category names (category_name) in BIND 9 include:
Category DescriptionThe client processes client requests.Config configuration file analysis and processing.Messages related to the BIND internal database are used to store zone data and cache records.Default matches all categories of unspecified chann
localhost to anyrecursionyes; #是否允许递归, yes Yes # The following DNSSEC recommendations are closed, directly deleted or commented out [[emailprotected]~]#service Namedrestart Stop named: [OK] Start named: [OK] #修改完配置文件后重启named服务 [[EMAILNBSP;PROTECTED]NBSP;~]#NBSP;SSNBSP;-TUNLP |grep:53udpUNCONN0 0192.168.0.196:53 *: *users: (("named", 7494,513) #监听开启, can communicate with the external network host3. Configuring the Primary DNS name server(1) Defin
others from querying my server version?A: Place the "version" option in the "Options" section of named.conf and set its value to a different version than the one you actually use. Note: This does not prevent attacks, but may prevent others from diagnosing your server problems, and it can also be a sign that someone else is identifying your server.8. How can I restrict only remote users from querying server versions?A: The following view statement intercepts the query when the internal view that
When I got to a new company, I had less time to study and was busy every day. In some ways, there was indeed resistance.
However, I have been learning for a long time, but it lacks coherence. Let's take a look at the west.
After several days of consideration, I focused on DNS and algorithms.
Completed by the end of October:
1. DNS Study Notes
2. DNS and BIND
March:
3. DNS Security: Key analysis protocols and existing documents, including DNSSEC
after logon is also the home page of victim, unless there are discussions about the default jump to the personal homepage after login.
The above is the principle of rebinding.
However, it should not be complete. Why is it necessary for such a complicated process, xss/csrf? Everything from getting cookies to hard redirection can be done by JS.
This is a sentence in the document:
"Using DNS rebinding,An attacker can circumvent implements rewallto spider implements ate in-Tranets, ex effecltrate s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.